CCNA1 v6.0 Chapter 1 Exam Answers 2017 (100%)

MiPDF.COM 1. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.) better security easy to create* better device performance when acting as both client and server lacks centralized administration* less cost to implement* scalable

2. Which device performs the function of determining the path that messages should take through internetworks? a router* a firewall a web server a DSL modem

3. What two criteria are used to help select a network medium from various network media? (Choose two.) the types of data that need to be prioritized the cost of the end devices utilized in the network the distance the selected medium can successfully carry a signal* the number of intermediary devices installed in the network the environment where the selected medium is to be installed*

4. Which two statements describe intermediary devices? (Choose two.) 1/7

Intermediary devices generate data content. Intermediary devices alter data content. Intermediary devices direct the path of the data.* Intermediary devices connect individual hosts to the network.* Intermediary devices initiate the encapsulation process.

5. What are two functions of end devices on a network? (Choose two.) They originate the data that flows through the network.* They direct data over alternate paths in the event of link failures. They filter the flow of data to enhance security. They are the interface between humans and the communication network.* They provide the channel over which the network message travels.

6. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? extranet intranet wired LAN wireless LAN* wireless WAN

7. What type of network must a home user access in order to do online shopping? an intranet the Internet* an extranet a local area network

2/7

8. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? an intranet* the Internet an extranet a local area network

9. Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.) cellular DSL* satellite cable* dial-up telephone

10. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.) DSL cellular* satellite* dialup dedicated leased line

11. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? convergence congestion* optimization synchronization

3/7

12. What type of network traffic requires QoS? email on-line purchasing video conferencing* wiki

13. Which expression accurately defines the term bandwidth? a method of limiting the impact of a hardware or software failure on the network a measure of the data carrying capacity of the media* a state where the demand on the network resources exceeds the available capacity a set of techniques to manage the utilization of network resources

14. A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? data integrity data quality data confidentiality* data redundancy

15. Which statement describes a characteristic of cloud computing? A business can connect directly to the Internet without the use of an ISP. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.* Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud.

16. What is the Internet? It is a network based on Ethernet technology.

4/7

It provides network access for mobile devices. It provides connections through interconnected global networks.* It is a private network for an organization with LAN and WAN connections.

17. Which statement describes the use of powerline networking technology? New “smart” electrical cabling is used to extend an existing home LAN. A home LAN is installed without the use of physical cabling. A device connects to an existing home LAN using an adapter and an existing electrical outlet.* Wireless access points use powerline adapters to distribute data through the home LAN.

18. What security violation would cause the most amount of damage to the life of a home user? denial of service to your email server replication of worms and viruses in your computer capturing of personal data that leads to identity theft* spyware that leads to spam emails

19. A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) implementing a firewall* installing a wireless network installing antivirus software* implementing an intrusion detection system adding a dedicated intrusion prevention device

20. Fill in the blank. A converged network is capable of delivering voice, video, text, and graphics over the same communication channels.

5/7

21. Fill in the blank. The acronym byod refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.

22. Match the description to the form of network communication. (Not all options are used.)

Web pages that groups of people can edit and view together -> wiki Interactive websites where people created and share user-generated content with friends and family -> Social media real-time communication of between two or more people -> instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast

23. Match each characteristic to its corresponding Internet connectivity type. (Not all options are used.)

satellite -> Not suited for heavily wooded areas

6/7

dialup telephone -> typically has very low bandwidth DSL -> splits the access line into three signals cable -> uses coaxial cable as a medium

24. Match the definition to the security goal. (Not all options are used.)

maintaining integrity -> the assurance that the information has not been altered during transmission ensuring confidentiality -> only the intended recipients can access and read the data ensuring availability -> the assurance of timely and reliable access to data

7/7

ccna5.net-CCNA1 v60 Chapter 1 Exam Answers 2017 100.pdf ...

a web server. a DSL modem. 3. ... dedicated leased line. 11. Which term ... Main menu. Displaying ccna5.net-CCNA1 v60 Chapter 1 Exam Answers 2017 100.pdf.

146KB Sizes 2 Downloads 120 Views

Recommend Documents

ccna5.net-CCNA1 v60 Chapter 4 Exam Answers 2017 100.pdf ...
to reduce the number of collisions on the media. to distinguish data bits ... Displaying ccna5.net-CCNA1 v60 Chapter 4 Exam Answers 2017 100.pdf. Page 1 of 7.

ccna5.net-CCNA1 v60 Chapter 2 Exam Answers 2017 100.pdf ...
the IOS image copied into RAM. the bootstrap program in the ROM. the contents of the current running configuration file in the RAM. the contents of the saved ...

ccna5.net-CCNA1 v60 Chapter 5 Exam Answers 2017 100.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

ccna5.net-CCNA 4 v60 Chapter 1 Exam Answers 100.pdf ...
Page 1 of 7. CCNA 4 v6.0 Chapter 1 Exam Answers 100%. CCNA 4 Connecting Networks v6.0 Chapter 1 Exam. Answers 100%. 1. A small company with 10 employees uses a single LAN to share. information between computers. Which type of connection to the Intern

ccna5.net-CCNA 4 v60 Chapter 4 Exam Answers 100.pdf ...
access-list 105 deny ip any host 10.0.54.5. access-list 105 permit ip any any**. R2(config)# interface gi0/0. R2(config-if)# ip access-group 105 in. R1(config)# ...

ccna5.net-CCNA 4 v60 Pretest Exam Answers 100.pdf
It is configured with a higher administrative distance than is the original dynamic routing. protocol. 5. Which three pairs of trunking modes will establish a ...

ccna5.net-CCNA 4 v60 Final Exam Answers Option A 100.pdf ...
A WAN is a public utility that enables access to the Internet. WAN is another ... municipal Wi-Fi. digital subscriber line. 5. ... multiplexing (DWDM)?. It supports the ...

ccna5.net-CCNA 4 v60 Final Exam Answers Option B 100.pdf ...
Page 1 of 15. CCNA 4 v6.0 Final Exam Answers Option B 100%. CCNA 4 v6.0 Connecting Networks Final Exam Answers. Option B. 1. Which circumstance would result in an enterprise deciding to implement a. corporate WAN? when its employees become distribute

IT-Essentials-ITE-v6.0-Chapter-1-Exam-Answers-100-2016.pdf
o FireWire. o DVI. o HDMI. o USB ... o digital camera. o projector. o speakers. 12. ... Page 3 of 7. IT-Essentials-ITE-v6.0-Chapter-1-Exam-Answers-100-2016.pdf.

ccna5.net-CCNA 4 v60 Final Exam Answers Option C 100.pdf ...
Each LAN has a specified demarcation point to clearly separate access layer and. distribution layer equipment. The LAN may use a number of different network access layer standards whereas the WAN. will use only one standard. 2. Which circumstance wou

Chapter 9 Answers - BISD Moodle
[24( ).] 39. Roughly 3.5 square units. (The area of the circle appears to be about halfway ..... relates an amusing story about a phone call from ... Cut from the center of the cake through ..... miles per hour and its human “engine” power was.

Chapter 2 Review Guide Answers
7. A square has the following dimensions: l = 2x -- 5. W = 33c - 1 a) Draw the figure and label the sides. b) Solve for X and determine the length of the sides. .... Find the sum of the two largesti ers of 4 consecutive even integers if the least int

PART I The Programmer's Exam CHAPTER 1 ...
The sizes of these types are defined in the Java language specification and are listed in Table 1.2. TABLE 1.2 Primitive .... byte 0 short 0 int 0 long 0L float 0.0f double 0.0d char '\u0000' boolean false object reference null. If you want to ......

chapter p chapter 1
Write the product in standard form. 5) (3 + 5i)(2 + 9i). 5). Find the product of the complex number and its conjugate. 6) -1 - 5i. 6). CHAPTER 1. Find the domain of ...

Chapter 1
converged to the highest peak because the selective pressure focuses attention to the area of .... thus allowing the formation of non-equal hyper-volume niches. In order to ..... The crossover operator exchanges the architecture of two ANNs in.

Chapter 1
strategy entails, the research findings are difficult to compare. .... rooms (cf. Li 1984; Wu 2001; Yu 2001). Comprehensive Surveys of EFL Learner Behaviours.

Chapter 1
increasing timeliness, and increasing precision [265]. Example: New data enable new analyses ..... but they allow researchers to take on problems of great scale and complexity. Furthermore, they are developing at ..... For MySQL, Chapter 4 provides i

Chapter 1
Digital System Test and Testable Design: Using HDL Models and Architectures ... What it is that we are testing in digital system test and why we are testing it? ..... mainframe cabinet containing the power distribution unit, heat exchanger for liquid

Chapter 1
Shall I send for the doctor?" The last thing he needed was a dose of the site doctor's hippopotamus-blood-and-cat- hair paste. He clambered quickly to his feet. Reonet peered at him through her fringe and pretended to continue with her work. The rest

Chapter 1
The expression x2 is greater than 2x for x 5 3. Through trial and error you can find that 3 is the only value of x where x2 is greater than 2x because 32 5 3 p 3 5 9 and. 23 5 2 p 2 p 2 5 8. Problem Solving. 48. 4s 5 4(7.5) 5 30. The perimeter is 30

Chapter 1
Impact of Bullying on Hospital, GP and Child Psychiatric Health Services. Long-term ... Appendix for Parents – Is My Child Being Bullied? Fears ..... per cent of lone mothers living alone had major problems in the area of social contact. ... Childr

Chapter 1
The Continuum Publishing Group Ltd 2003, The Tower Building, 11 York Road, London SE1 7NX ... trying to find a link between this information and its insight into peda- ..... reports on Chinese EFL learners' strategies for oral communication.

Chapter 1
Patients with AH make external misattributions of the source ... The exclusive license for this PDF is limited to personal website use only. No part of this digital ...... (2001). Verbal self-monitoring and auditory verbal hallucinations in patients

IT-Essentials-ITE-v6.0-Chapter-2-Exam-Answers-100-2016.pdf
brownouts and blackouts? o by grounding ... o Brownout. o Sag. Page 1 of 6 ... Page 3 of 6. IT-Essentials-ITE-v6.0-Chapter-2-Exam-Answers-100-2016.pdf.